Andreeva, E.
, Bouillaguet, C.
, Dunkelman, O.
, Fouque, P.
, Hoch, J.
, Kelsey, J.
, Shamir, A.
and Zimmer, S.
(2015),
New Second-Preimage Attacks on Hash Functions, Journal of Cryptology, [online], https://doi.org/10.1007/s00145-015-9206-4, https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=918851
(Accessed December 15, 2024)